Add Microsoft ADAL to Any Mobile App Without Coding
Microsoft Azure Active Directory Authentication Library (ADAL) is a framework designed to make secured resources available to apps via security tokens. Apps integrated with ADAL can share authentication state enabling seamless SSO (Single Sign-On) capabilities.
This Knowledge Base article provides the steps to add Microsoft ADAL to any mobile Android or iOS app.
We hope you find it useful and enjoy using Appdome!
Adding Microsoft ADAL to Mobile Apps Fast
Appdome is a mobile integration platform as a service (iPaaS) that allows users to add a wide variety of features, SDKs and APIs to Android and iOS apps. Using a simple ‘click to add’ user interface, Appdome allows anyone to easily integrate Azure AD SSO to any mobile app – instantly, no code or coding required.
Using Appdome, there are no development or coding prerequisites. For example, there is no Appdome SDK, libraries, or plug-ins to implement. Likewise, there are no required infrastructure changes and no dependency on SAML, OAuth, OpenID Connect or any other authentication standard inside the app. Users merely upload mobile apps, select the Azure AD service and click “Build My App.” The Appdome technology adds Azure AD SSO and relevant standards, frameworks and more to the app automatically, with no manual development work at all.
Using Appdome, mobile apps will use Microsoft ADAL SSO to authenticate users as if ADAL was natively coded to the app. Appdome for ADAL SSO is compatible with mobile apps built in any development environment including Native Android and iOS apps, hybrid apps and non-native apps built in Xamarin, Cordova, and React Native, Ionic and more. This streamlines implementations, cuts development work, and ensures a guaranteed and consistent integration of Microsoft ADAL SSO to any mobile app.
Microsoft ADAL is used primarily in Microsoft apps. Mobile apps that are not created by Microsoft typically support other authentication methods, not ADAL. Using the MicrosoftADAL-OAuth 2.0 framework in non-Microsoft mobile apps is complex. These applications need a way to share authentication state based on tokens received by Microsoft Outlook or the Microsoft Authenticator application.
Microsoft ADAL offers two modes of authentication: (1) direct authentication – where the user is directed to an Authentication Authority page, and (2) Brokered Authentication – where the user would also have an authenticator application installed. The authenticator handles a shared authentication for all the applications that need to authenticate.
The following diagram illustrates the Single-Sign-On flow for apps that have been integrated with Microsoft ADAL. Note: The flow is similar for direct and brokered authentication.
The application sends an unauthorized request to reach a resource like internal.mycomp.com which is protected by a gateway, AD, or the app server itself.
The server protecting the resource responds with 401 or 30X response since the request is not authorized.
Appdome identifies the response for the protected resource and opens an internal Webview within the Built App.
The internal Webview is opened to the ADAL Hub URL (For example: myadal.com.com).
The user can now authenticate using any authentication method the hub URL requires, during the authorization session, the cookies and authorization token are received.
The Azure server redirects to the successful URI (e.g. mycomp://authorized) since the authorization succeeded. Note that the app’s Success URI is configured on Azure should match the configuration during fusion.
Appdome identifies the successful URI redirect and closes the internal Webview, thus returning the view to the original app.
Now, when the app tries to reach the protected resource, the authorization header or cookies are attached to the outgoing request. The gateway will trust these credentials and the app will reach the protected resource successfully.
How to add Microsoft ADAL SSO to Any Mobile App on Appdome
Appdome makes using Microsoft ADAL in mobile apps easy. Simply upload an Android or iOS application to Appdome, select Microsoft ADAL and click “Build My App.” Below is a step-by-step guide to completing a full integration of Microsoft ADAL in mobile apps on Appdome.
Follow these step-by-step instructions to add Microsoft Adal SSO to any mobile app:
Select the Build tab. Note: a blue underline will appear showing the step is active
Select the Authentication category. Note: a blue highlight will appear showing the category is active.
Enable Authentication Profiles
Select Microsoft Active Directory Authentication Library (ADAL) from the drop-down menu.
You can add specific URLs to apply the authentication to, or leave “all” to apply to all URLs accessed by the app.
Enter the URL for your ADAL Authority
Enter the URI for Redirect URI
Enter the Client ID for the app (in Azure sometimes also called Application ID)
Optionally toggle “ON” Validate Authority
Optionally toggle “ON” Brokered Authentication
Click Build My App
The technology behind Build My App has two major elements – (1) a microservice architecture filled with 1000s of code sets needed for mobile integrations, and (2) an adaptive code generation engine that can recognize the development environment, frameworks and methods in each application and match the application to the relevant code-sets needed to add Microsoft ADAL SSO to the mobile app in seconds.
Congratulations! You now have a mobile app fully integrated with Microsoft ADAL SSO.
After Adding Microsoft ADAL SSO to a Mobile App on Appdome
After you have added Microsoft ADAL SSO to any mobile app on Appdome, there are a few additional steps needed to complete your mobile integration project. Read this Knowledge Base article to learn what to do after you successfully build an app. It explains both optional steps and required steps.
That is it – Enjoy Appdome for Microsoft ADAL SSO in your application!